Cart32 c32web.exe ImageName Traversal Arbitrary File Access

medium Nessus Plugin ID 26924

Synopsis

The remote web server contains a CGI script that is affected by an information disclosure vulnerability.

Description

Cart32, a shopping cart application, is installed on the remote host.

The remote installation of Cart32 fails to sufficiently validate input to the 'GetImage' function of 'c32web.exe' script before returning the contents of arbitrary files, not just image files as intended. An unauthenticated, remote attacker can exploit this issue to retrieve arbitrary files, such as the application's configuration or database files.

Solution

Upgrade to Cart32 version 6.4 as that version reportedly resolves the issue.

See Also

https://www.securityfocus.com/archive/1/481489/30/0/threaded

Plugin Details

Severity: Medium

ID: 26924

File Name: cart32_file_retrieval.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 10/5/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/4/2007

Reference Information

CVE: CVE-2007-5253

BID: 25928

CWE: 20